FOCA 2.5 Chema Alonso José Palazón «PALAKO»
What our FOCA is not
What our FOCA is not
What’s a FOCA?
FOCA on Linux?
Previously on FOCA….
FOCA 0.X
FOCA: File types supported Office documents: Open Office documents. MS Office documents. PDF Documents. XMP. EPS Documents. Graphic documents. EXIFF. XMP. Adobe Indesign, SVG, SVGZ ( NEW )
What can be found?
Pictures with GPS info..
Demo: Single files
Sample: mda.mil Total:  1075 files
Sample: FBI.gov Total:  4841 files
FOCA 1 v. RC3 Fingerprinting  Organizations with Collected Archives Search for documents in Google and Bing Automatic file downloading Capable of extracting Metadata, hidden info and lost data Cluster information  Analyzes the info to fingerprint the network.
DNS Prediction
Google Sets  Prediction
Sample: Printer info found in odf files returned by Google
Demo: Whitehouse.gov
Yes, we can!
FOCA 2.0
What’s new in FOCA 2.5? Network Discovery Recursive algorithm Information Gathering Sw Recognition DNS Cache Snooping Reporting Tool
FOCA 2.5: Exalead
PTR Scannig
Bing IP
FOCA 2.5 & Shodan
Network Discovery Algorithm http://apple1.sub.domain.com/~chema/dir/fil.doc http -> Web server  GET Banner HTTP domain.com is a domain Search NS, MX, SPF records for domain.com sub.domain.com is a subdomain Search NS, MX, SPF records for sub.domain.com Try all the non verified servers on all new domains server01.domain.com server01.sub.domain.com Apple1.sub.domain.com is a hostname Try DNS Prediction (apple1) on all domains Try Google Sets(apple1) on all domains
Network Discovery Algorithm http://apple1.sub.domain.com/~chema/dir/fil.doc 11) Resolve IP Address 12) Get HTTP Banner of  http://IP 13) Use Bing Ip:IP to find all domains sharing it 14) Repeat for every new domain  15) Connect to the internal NS (1 or all) 16) Perform a PTR Scan searching for internal servers 17) For every new IP discovered try Bing IP recursively 18) ~chema -> chema is probably a user
Network Discovery Algorithm http://apple1.sub.domain.com/~chema/dir/fil.doc 19)  /  ,  /~chema/   and  /~chema/dir/  are paths 20) Try directory listing in all the paths 21) Search for PUT, DELETE, TRACE methods in every path 22) Fingerprint software from 404 error messages 23) Fingerprint software from application error messages 24) Try common names on all domains (dictionary) 25) Try Zone Transfer on all NS 26) Search for any URL indexed by web engines related to the hostname 27) Download the file 28) Extract the metadata, hidden info and lost data 29) Sort all this information and present it nicely 30) For every new IP/URL start over again
 
FOCA 2.5 URL  Analysis
FOCA 2.5 URL Analysis
Demo: Whitehouse.gov
Yes, we can!
DNS Cache Snooping
FOCA Reporting Module
FOCA Reporting Module
Demo: DNS Cache Snooping
FOCA Online http://www.informatica64.com/FOCA
IIS MetaShield Protector http://www.metashieldprotector.com
Cleaning documents OOMetaExtractor http://www.codeplex.org/oometaextractor
Questions at Q&A room 113 Speakers:  Chema Alonso  [email_address] Blog:  http://elladodelmal.blogspot.com   http://twitter.com/chemaalonso José Palazón «PALAKO» [email_address] Working on FOCA: Chema Alonso Alejandro Martín Francisco Oca Manuel Fernández «The Sur» Daniel Romero Enrique Rando Pedro Laguna Special Thanks to: John Matherly [Shodan]
…  and Tomorrow here at 19:00
Demo:  US Army

Defcon 18: FOCA 2